security (283)

Hi Global Risk Community member,

You have likely heard the words “digital transformation” ad nauseam. Regardless, the increasingly complex world of cloud-based business applications and remote working isn’t going away any time soon. As this complexity of your digital ecosystem increases, so does the need for a strong security and risk management strategy. So where do you start?
 
The implementation of an Identity Governance and Administration (IGA) solution enables organizations to address many

Read more…

Hi Global Risk Community member,
 
With the increasingly complex IT-security ecosystems organizations are facing, Identity Governance Administration (IGA) is an important component of an organization’s security model. It provides the foundation for identity management, allowing organizations to ensure users are not given excessive or unnecessary access to systems, applications, or data. Organizations without proper IGA are vulnerable to fraud and data breaches.
 
Download Fastpath’s “Identit

Read more…

Hi Global Risk Community member ,

Join us next month for: Think Like a Hacker: Tactics to Identify Gaps in Your IT Security Posture on Thursday, March 16th at 1pm Eastern.

Cybersecurity is one of the largest concerns facing businesses today and hackers continuously develop diverse ways of penetrating your cybersecurity defences. Learn how to think like a hacker and protect your systems and data from cyber threats by taking proactive measures, including:

  • Conducting thorou
Read more…

Hello Global Risk Community member,

Maintaining your ERP, CRM and HCM system security is an ongoing process.
Join Fastpath on Thursday November 3rd at 11 AM ET for a webinar where we will share 50 practical security tips delivered rapid-fire and designed for organizations to start improving their security immediately. We will also review principles for good security moving forward.  
In this webinar we will review tips such as:

  • Specific security settings
  • Improving security via setup
  • Process
Read more…

Enterprise Security Inside and Out

Fastpath launched a monthly podcast to discuss all things surrounding your enterprise security hosted by Alex Meyer.

Fastpath is launching a new monthly podcast hosted by Microsoft MVP Alex Meyer. The podcast titled “Enterprise Security Inside and Out”  delves into all things surrounding your enterprise application security, current trends, best practices for your business application systems such as ERP, HCM and CRM.

The show will also feature insightful interviews with experts who work with th

Read more…

Hello Global Risk Community member,

Hearst is a media giant with more than 360 businesses diversified across media, information, and services.
After implementing Oracle ERP Cloud, Hearst’s Application Security Audit Manager, Ivan Ng, was tasked with finding a solution that would enable Hearst to have the proper controls in place across all their business units, including those that were not on Oracle yet. Ivan chose Fastpath. Why? “It is very apparent that the application was written by auditor

Read more…


If you’ve moved from Dynamics AX to Dynamics 365 in the cloud, you should be aware of some changes that will affect how you manage your security settings.
We invite you to download our latest eBook
, Security When Migrating D365FO to the Cloud, which covers:

  • Changes in the security model from AX on premises to Dynamics 365 in the cloud and the impact these changes will have on your licensing
  • Key concepts around strong cloud security
  • Security gotchas and questions you should be asking your cloud
Read more…

This is a transcription of our interview with Liam Healy, SVP and Managing Director at Diligent about ESG, Legal Operations and CyberSecurity. 

You can watch the original video interview here or an audio podcast here. You are also welcome to subscribe to our podcast in all major podcast apps by searching "Risk Management Show".

8272620482?profile=original 

Boris: Welcome to our interview with Liam Healy. Liam is a SVP and Managing Director at Diligent, which is a market leading provider of the comprehensive Governance sof

Read more…

Free eBook: Common SAP security mistakes and how to fix them

 

Hi Global Risk Community member,

Maintaining SAP system security can be difficult.

SAP systems offer powerful security features to help find and correct system security violations. It is the responsibility of the developers, administrators, and emergency response teams to ensure system security is maintained and to review new code before it is moved into production.

However, even knowing about these tools,

Read more…

The emergence of smart homes and the consequent prevalence of smart home security cameras has been associated with consumer preference towards energy efficiency and optimum resource utilization. While smart homes are popular for these advantages, security cameras are witnessing a surge in their adoption as we see a rise in security issues in and around these homes. The advent of next-generation wireless technologies such as HVAC Controller, security and access regulators, and entertainment contr

Read more…

Security information and event management was initially designed to help organizations achieve compliance and keep their information compliant but has evolved over the years. Moving beyond its roots, software vendors now provide machine learning, advanced statistical analysis, and other analysis methods for your products for security information and event management (SIEM).

8028321266?profile=original

The SIEM and Threat Management evolution continues to build on a scalable open security platform that supports security and

Read more…

8028322493?profile=original

FranSec Virtual IT Security Conference launches on 24th – 25th June, uniting cyber security leaders from across the country to exchange in-depth knowledge and expertise towards safeguarding the nation’s Banking & Finance, Energy, FMCG, Agriculture, Manufacturing, Chemical & Pharmaceuticals, Automotive industries.

 

2019 was a record-breaking year for cyber-attacks in France. A staggering 67% of companies fell victim to malicious activity and with only 10% equipped to cope with them. As digitalisat

Read more…

Health care is focused on the use of innovation and connectivity in an age of digitization to advance the field. Smartphones, cyber networks, mobile devices, and interconnections can be used by healthcare providers to enhance patient care and quality of care.

8028322287?profile=original

As consumer requirements grow, health companies and technology giants have the opportunity to develope  mHealth applications. Through mobile health apps, players in the healthcare sector are searching for the ability to combine electronic he

Read more…

Are you newly working from home? Or are you an old pro? Either way, it is likely you are using some form of remote desktop protocol. Those of us who have been working home as our primary means of earning a living, know these tools very well and are accustomed to eliminating the various distractions in our home environment in order to get the job done. There are some precautions to be aware of.

None of us think that we are going to get hacked, even though we have seen time and time again that it i

Read more…

Once again, tax time has rolled around, and though you technically have until April 15th, it’s always best to file a bit earlier…especially if you want to avoid setting yourself up for ID theft.

How Could Filing Taxes Compromise Your Identity?

Here’s how you could become a victim of ID theft just by filing your taxes: the first method is that a thief uses your Social Security number to file taxes, and then they steal your refund. The second method that they use is they take your Social Security nu

Read more…

Hey YOU, SMB, yeah I’m talking to you. There are a number of things that you can do to not only protect your personal information, but also the information you have in your business:

  1. Hire a professional  It is entirely possible the small business was hacked because they did not employ technicians to prevent it in the first place. Therefore 3rd parties that specialize is security and breach mitigation should be contacted immediately. These IT security professionals specialize in containment. Thei
Read more…

You might not realize it, but your electronic devices may be tracking you. They know what you are doing, what you are reading, and the things you like to do. In almost every case, you give these devices permission to collect this info when you start using them. Here are some tips to help you prevent your devices from spying on you:

Laptops

Macs

If you are using a macOS computer, you can limit the information you are sending to Apple by choosing the Apple menu > System Preferences > Security & Priva

Read more…

You have likely heard of the dangers of using unsecure public Wi-Fi, so you know that hackers are out there snooping. It is pretty easy to hack into a laptop or mobile device that is on a public Wi-Fi connection with no protection. Hackers can read your emails, steal passwords, and even hijack your website log ins.

Let’s imagine that you are in a local coffee shop with your laptop. All someone has to do is download a wireless network analyzer, which usually has a free trial, and with the right ha

Read more…

Your Uber Driver May be a Criminal

Do you Uber? If you do, you probably feel pretty safe getting into the car of a stranger. However, you might not be as safe as you think.

Most people take for granted that Uber does background checks on its drivers, but there are actually a number of shady drivers who have recently been accused of crime, and it’s definitely not the first time they have had run ins with law enforcement. Some of these people are accused of committing crimes against their passengers, and that’s where things really g

Read more…

8028308088?profile=original

In the age of rapid technological progress, where Digital Transformation  has become pervasive, business applications are getting increasingly complex and interconnected.  The advancement in technology has also helped attackers get more aggressive and inflict more damage to IT systems and applications.  Application security tools and techniques are evolving too, yet most organizations still fall prey to vulnerabilities.  Cybersecurity has become a bigger threat than ever before.

The current appli

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead